Do you remember the name Mirai? Sure, you do. Back in 2016, Mirai became the first IoT botnet to make headlines by hitting global DNS provider Dyn and taking down almost half of the Internet. Now, Mirai is back with a new target. Last week, researchers from IBM X-Force found that variants of the infamous…

Con artists have been around since biblical times, but today they flourish. The Internet has provided the world with any-to-any communications and automation. In turn, these technologies have allowed the con-man to do with their illicit efforts what the Ford T did to the car industry – bring it to the masses. Phishing is the…

Your IoT’s not sick – Someone just turned it into a brick! A 14-year-old hacker created a new strain of malware called “Silex malware” which bricked over 4000 IoT devices in the span of a few hours. Once again, the world is shocked to find that IoT devices are vulnerable to all kinds of attacks.…

IoT devices, such as routers, printers, televisions, cameras, lamps, baby-monitors and what-ever-else, can be found, well, everywhere. Their use has been growing for years and is expected to continue to grow. Unfortunately, these devices are notoriously vulnerable, or worse, the security implementation is so flawed that they are counter-protective leaving the consumer with a false feeling…

After reigning for 8+ years as the standard for mobile broadband, 4G networks are about to be dethroned by 5G. 5G networks promise dramatically faster speeds, lower latency and massive machine to machine communications – but is this enough to ensure happy consumers? Back in 2009, 4G was launched with the promise of delivering faster…

Ransomware was deemed one of the biggest malware threats of 2018, and it continues to disrupt the operations of businesses and the daily lives of individuals all over the world in 2019. The 2019 ransomware landscape is quite diverse – security researchers track over 1,100 different ransomware variants preying on innocent web users. As this…

Last week, Russian media was hit with news about massive DNS (Domain Name System) attacks on Yandex, the country’s biggest technology company and local giant of internet search – essentially, the Google of Russia. The network attacks exploited vulnerabilities in the block-list system of Roskomnadzor, Russia’s state censor, that the government uses to ban sites…

Where is Your CSP on the Closed Loop Automation Journey? Automation in telecom is not new. But it has evolved. Initially, it was about being more efficient at solving well-defined problems – the known knowns. Solutions like Root Cause Analysis that reduced tens of thousands of NOC alarms to a single “parent alarm”, which highlighted…

MWC went by so fast that you may have missed some of the highlights. Luckily, we’ve compiled the following takeaways from the Barcelona conference. With apologies to Don Adams, it really is time to Get Smart! From Smart Cities and Smart Homes, to Smart Mobility and Smart Wellness, you might think that we’ve moved out…

Anyone with millennial-aged children at home will find it hard to remember them without their faces glued to their mobile phones. It seems that their entire universe has been shrunk into a tiny metallic and glass panel, a bit like the Big Bang in reverse. For those young adults, whose birth years begin with the…